首页> 外文会议>Selected areas in cryptography. >Improved Analysis of ECHO-256
【24h】

Improved Analysis of ECHO-256

机译:改进的ECHO-256分析

获取原文
获取原文并翻译 | 示例

摘要

ECHO-256 is a second-round candidate of the SHA-3 com petition. It is an AES-based hash function that has attracted a lot of interest and analysis. Up to now, the best known attacks were a distin guisher on the full internal permutation and a collision on four rounds of its compression function. The latter was the best known analysis on the compression function as well as the one on the largest number of rounds so far. In this paper, we extend the compression function results to get a distinguisher on 7 out of 8 rounds using rebound techniques. We also present the first 5-round collision attack on the ECHO-256 hash function.
机译:ECHO-256是SHA-3竞赛的第二轮候选人。它是基于AES的哈希函数,引起了很多关注和分析。到目前为止,最著名的攻击是完全内部置换的明显破坏,以及其压缩功能的四轮碰撞。后者是对压缩函数的最著名的分析,也是迄今为止最多的轮次分析。在本文中,我们使用回弹技术扩展了压缩函数的结果,从而在8轮中的7轮中获得了识别器。我们还介绍了对ECHO-256哈希函数的首次5轮碰撞攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号